Friday, August 18, 2017

Assange Went Hard on Hillary, Limp on the Kremlin


A lot of people started smelling a rat when Julian Assange went a little bizarre during his latter years holed up in the Ecuadorian embassy in London.  Something wasn't right. Something else was going on.

Now it's reported that, while Julian Assange focused on dumping emails intended to damage Hillary Clinton's chances in the 2016 presidential election, he spiked a treasure trove of leaked documents damaging to the Kremlin.

In the summer of 2016, as WikiLeaks was publishing documents from Democratic operatives allegedly obtained by Kremlin-directed hackers, Julian Assange turned down a large cache of documents related to the Russian government, according to chat messages and a source who provided the records.

WikiLeaks declined to publish a wide-ranging trove of documents — at least 68 gigabytes of data — that came from inside the Russian Interior Ministry, according to partial chat logs reviewed by Foreign Policy.

“We had several leaks sent to Wikileaks, including the Russian hack. It would have exposed Russian activities and shown WikiLeaks was not controlled by Russian security services,” the source who provided the messages wrote to FP. “Many Wikileaks staff and volunteers or their families suffered at the hands of Russian corruption and cruelty, we were sure Wikileaks would release it. Assange gave excuse after excuse.”

The Russian cache was eventually quietly published online elsewhere, to almost no attention or scrutiny.

In the months leading up to the 2016 U.S. presidential election, WikiLeaks published tens of thousands of potentially damaging emails about Democratic candidate Hillary Clinton and her campaign, information the U.S. intelligence community believes was hacked as part of a Kremlin-directed campaign. Assange’s role in publishing the leaks sparked allegations that he was advancing a Russian-backed agenda.

Back in 2010, Assange vowed to publish documents on any institution that resisted oversight.

Is this conclusive evidence that Assange has gone rogue? Not really. Then again I haven't seen the stuff Assange rejected and, I suspect, neither have you. It could be a smoking gun, I don't know. What I do know is that this adds to previous evidence suggesting that Julian Assange may be using WikiLeaks selectively to advance a personal agenda. That I find all too believable.

7 comments:

rumleyfips said...

Alt wrong sites are now throwing up smoke screens . They , and Assange, claim that the DNC hack was really a leak. Their proof; Trump has talked himself into trouble again.

braeckmansj said...

Do you know that you can hack any ATM machine !!!

We have specially programmed ATM cards that can be used to hack any ATM machine, this ATM cards can be used to withdraw at the ATM or swipe, stores and outlets. We sell this cards to all our customers and interested buyers worldwide, the cards has a daily withdrawal limit of $5000 in ATM and up to $50,000 spending limit in stores. and also if you in need of any other cyber hacking services, we are here for you at any time any day.
  
Here is our price list for ATM cards:
BALANCE PRICE
$5,000----------------$300
$10,000 ------------- $650
$20,000 ------------- $1,200
$35,000 --------------$1,900
$50,000 ------------- $2,700
$100,000------------- $5,200
 The price include shipping fees,order now: via email...braeckmansj@outlook.com

John B. said...

Maybe Assange just prefers the playgrounds where he's less likely to stop breathing.

Purple library guy said...

I suppose he could be becoming biased, consciously or unconsciously, in favour of people who aren't trying to have him jailed and tortured. An understandable failing, I would think, but admittedly something we should keep in mind.

Pedro Martin said...
This comment has been removed by a blog administrator.
Cyber Shieldnotch said...

◾ "PROTOCOL SHIELDERS" ◾
Hello,

I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

Read it carefully!!
Its reading will not take more than 10mins.

We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

WARNING:
MOST HACKERS YOU SEE HERE ARE FAKES
AND INCONGUROUS!!.
It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

HOW WOULD YOU KNOW??

You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

1, you see uncertified email accounts carrying numberings like
"iamhacklord1232@(gmail,yahoo or hotmail.com"
pls flee from them, BIG SCAMMERS.
They take your money and never do your job!!

2, you see posts like "do you need to spy on spouse?"
All fake! , just a way to lure you toward getting ripped OFF!.

3, posting fake testimonies and comments to trick you into feeling save and secured.
Pls endeavour to ignore!!

◾VERY IMPORTANT◾

For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
"CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
must firmly ascertain.

◾OUR "AIMS" HERE◾
Are:
1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

write us on:
◾Protocolhacks@gmail.com or
◾Cybershieldnotch@gmail.com
◾Cybeshieldnotch@protonmail.com,

COREY ROD,
SIGNED...!
Thank you!!!

Cyber Shieldnotch said...

◾ "PROTOCOL SHIELDERS" ◾
Hello,

I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

Read it carefully!!
Its reading will not take more than 10mins.

We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

WARNING:
MOST HACKERS YOU SEE HERE ARE FAKES
AND INCONGUROUS!!.
It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

HOW WOULD YOU KNOW??

You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

1, you see uncertified email accounts carrying numberings like
"iamhacklord1232@(gmail,yahoo or hotmail.com"
pls flee from them, BIG SCAMMERS.
They take your money and never do your job!!

2, you see posts like "do you need to spy on spouse?"
All fake! , just a way to lure you toward getting ripped OFF!.

3, posting fake testimonies and comments to trick you into feeling save and secured.
Pls endeavour to ignore!!

◾VERY IMPORTANT◾

For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
"CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
must firmly ascertain.

◾OUR "AIMS" HERE◾
Are:
1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

write us on:
◾Protocolhacks@gmail.com or
◾Cybershieldnotch@gmail.com
◾Cybeshieldnotch@protonmail.com,

COREY ROD,
SIGNED...!
Thank you!!!